Chirine Ghédira

ORCID: 0000-0003-0908-2711
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Service-Oriented Architecture and Web Services
  • Semantic Web and Ontologies
  • Business Process Modeling and Analysis
  • Data Quality and Management
  • Cloud Data Security Solutions
  • Blockchain Technology Applications and Security
  • Advanced Software Engineering Methodologies
  • Privacy-Preserving Technologies in Data
  • Access Control and Trust
  • Cloud Computing and Resource Management
  • Privacy, Security, and Data Protection
  • IoT and Edge/Fog Computing
  • Mobile Agent-Based Network Management
  • Context-Aware Activity Recognition Systems
  • Distributed and Parallel Computing Systems
  • Advanced Database Systems and Queries
  • Scientific Computing and Data Management
  • Caching and Content Delivery
  • Peer-to-Peer Network Technologies
  • Software System Performance and Reliability
  • Security and Verification in Computing
  • Distributed systems and fault tolerance
  • Web Applications and Data Management
  • Data Management and Algorithms
  • Spam and Phishing Detection

Laboratoire d'Informatique en Images et Systèmes d'Information
2012-2025

Université Jean Moulin Lyon III
2016-2025

Centre National de la Recherche Scientifique
2012-2025

Université Claude Bernard Lyon 1
2016-2025

Institut National des Sciences Appliquées de Lyon
2001-2025

Practical Action
2011-2023

École Nationale Supérieure de l'Électronique et de ses Applications
2023

Lyon College
2021

Orange (Poland)
2017

Université de Lyon
2015

Web services composition is a keystone in the development of interoperable systems. However, despite widespread adoption services, several obstacles still hinder their smooth automatic semantic reconciliation when being composed. Consistent understanding data exchanged between composed hampered by various implicit modeling assumptions and representations. Our contribution this article revolves around context how it enriches exchange services. In particular, context-based mediation approach...

10.1145/1294148.1294152 article EN ACM Transactions on Internet Technology 2007-11-01

Data analytics based on the produced data from Internet of Things (IoT) devices is expected to improve individuals’ quality life. However, ensuring security and privacy in IoT aggregation process a non-trivial task. Generally, centralized servers. Yet, case distributed approaches, it difficult coordinate several untrustworthy parties. Fortunately, blockchain may provide decentralization while overcoming trust problem. Consequently, blockchain-based become reasonable choice for design...

10.3390/s21072452 article EN cc-by Sensors 2021-04-02

<title>Abstract</title> This paper addresses the security challanges faced by adoption of blockchaintechnology. It presents a comprehensive framework designed to assess securityrisks within blockchain-based applications. leverages novelapproach based on threat modeling methodology and industry standards. Itbegins with intelligence analysis, which involves gathering analyzinginformation about emergent threats in blockchain landscape. Then, conduct athreat identify, assess, mitigate potential...

10.21203/rs.3.rs-6194972/v1 preprint EN cc-by Research Square (Research Square) 2025-03-17

The Internet of Things (IoT) is expected to improve the individuals’ quality life. However, ensuring security and privacy in IoT context a non-trivial task due low capability these connected devices. Generally, device management based on centralized entity that validates communication connection rights. Therefore, this can be considered as single point failure. Yet, case distributed approaches, it difficult delegate right validation devices themselves untrustworthy environments. Fortunately,...

10.1145/3434776 article EN ACM Transactions on Internet Technology 2021-01-05

Data as a Service (DaaS) builds on service-oriented technologies to enable fast access data resources the Web. However, this paradigm raises several new privacy concerns that traditional models do not handle. In addition, DaaS composition may reveal privacy-sensitive information. paper, we propose formal model in order extend descriptions with capabilities. The allows service define policy and set of requirements. We also privacy-preserving approach allowing verify compatibility between...

10.1109/tsc.2013.18 article EN IEEE Transactions on Services Computing 2013-03-07

Today, with the exponential rise in use of internet, trend massive mobile devices (tablets, laptops, computers, iPads etc...) user has become inseparable from his smartphone, which facilitates several services different fields (work, research, commerce, etc.). Besides, proliferation data, needs consumers are becoming increasingly complex. So composition web remains a necessary process allowing to combine atomic aggregating functionalities answer complex request. Several techniques literature...

10.1109/tsc.2024.3361655 article EN IEEE Transactions on Services Computing 2024-02-05

User privacy concerns are widely regarded as a key obstacle to the success of modern smart cyberphysical systems. This article analyzes, through an example, some requirements that future data collection architectures these systems should implement provide effective protection for users. Then, gives example how can be implemented in smarthome scenario. An architecture allows user balance risks with potential benefits and make practical decision determining extent sharing. On basis this...

10.1109/mcc.2018.053711666 article EN IEEE Cloud Computing 2018-09-01

The Internet of Things (IoT) provides the opportunity to collect, process and analyze data. This helps understand preferences life patterns individuals in order offer them customized services. However, privacy has become a significant issue due personal nature knowledge derived from these data involved potential risks. Despite increasing legislation pressure, few proposed solutions have dealt with requirements, such as consent choice, purpose specification, collection limitation. In this...

10.1109/compsac.2018.10322 preprint EN 2018-06-22

Service-oriented architecture (SOA) is known to be characterized by its openness, agility and composability. Such includes autonomous, interoperable potentially reusable services, which are implemented as Web Services (WS). When deployed in the Cloud Environment, security threats may increase at WS level, raising some challenges, such vulnerability discovery trust or availability violation. Addressing issues require complex tasks that should treated separately with associated concerns. To...

10.1016/j.procs.2019.09.192 article EN Procedia Computer Science 2019-01-01

Web services are becoming an essential support for inter-enterprise collaborative business process. Nevertheless, in spite of the crucial progress service technologies there is some shortage especially discovery and selection phase. In fact, selected based on functional criteria. But, case process collaboration a need to consider more pragmatic criteria such as context parameters. this work we present framework creation. It enables contextual description. For end, novel categorization...

10.1145/1416729.1416737 preprint EN 2008-01-01

Over the last few years, Web services technologies offered a new and successful way for interoperability among web applications. A service is software system designed in that other components humans can discover invoke to satisfy different needs. The vision of WS as component allows combine several WS, providing global value-added called composite WS. Although there are researches composition, more effort should be focused on its personalization, particularly regarding how well composition...

10.1016/j.entcs.2005.11.011 article EN Electronic Notes in Theoretical Computer Science 2006-01-01

Rich types of data offered by as a service(DaaS) in the cloud are typically associated with different and complex concerns that DaaS service providers, providers consumers must carefully examine agree before passing utilizing data. Unlike agreements, reflecting conditions established on basis concerns, between relevant stakeholders have got little attention. However, contextual, given trend mixing sources automated techniques, such mash up, agreements be discovery, retrieval utilization....

10.1109/apscc.2011.59 preprint EN 2011-12-01

An operational e-health infrastructure including pervasive services and remote distributed applications servers in the cardiology domain is presented. Based on implementation of previously reported software components building blocks, developed particular within frame European projects, architecture promotes facilitates use advanced methods quantitative electrocardiology. The expected outcome improvement early detection cardiac diseases, patients follow-up enhancement citizens quality life.

10.1109/cic.2003.1291103 article EN Computers in cardiology 2003-01-01

Web services and their compositions are now established as a standard means for interconnecting applications in or between organizations. In this paper, we propose an original approach called WeSCo_CBR (Web Service Composition founded on Case Based Reasoning) that aims at enhancing the process of dynamic web service composition by using case based reasoning technique Service's semantic description.

10.1109/icebe.2006.106 preprint EN 2006-01-01

Testing is a vital component of the system development life cycle. As information systems infrastructure move from native computing to cloud-based and virtualized platforms, it becomes necessary evaluate their effectiveness ensure completion organizational goals. However, complexity scale environments make this process difficult. Additionally, inherited novel issues further complicate process, while relatively high costs can be constraining. Enabling service-driven provide evaluation...

10.1109/access.2019.2912957 article EN cc-by-nc-nd IEEE Access 2019-01-01

The traceability of drugs remains a significant issue, especially with the number products proposed on Web. Detecting counterfeit is challenge, given what these could represent as danger to health and economy. Several studies have been made in literature tried propose solutions. However, several limitations remain. In this context, paper presents our framework, ChainDrugTrac, for detection pharmaceutical products. After studying existing work identifying limits, contributions be resumed...

10.1145/3477314.3507118 article EN Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing 2022-04-25

Contextual factors are considered an important mediator for improving recommender system performance. In the e-commerce sector, such contextual as users' real-time state of mind and budget play a critical role in consumers' decision-making processes. Using context-aware approach, authors' recommendation model can identify based on clickstream data. They've deployed their French website comparative A/B test. Results show that usage is significantly higher than benchmarking system.

10.1109/mitp.2015.96 article EN IT Professional 2015-11-01
Coming Soon ...